Ransomware: how to know where it was sent in your company!

Ransomware: how to know where it was sent in your company!

Ransomwareis big in the news these days, but what is it exactly?

A ransomwareis a malicious softwarethathijacksyour data.To do so,theransomwareencrypts the dataand then asksthe ownertosend moneyin exchange forthe key that will allow you todecrypt your files.

Your users receive an email. They download the attachment (ZIP) out of habit, and then, everything goes wrong! Here you are with encrypted files everywhere and you do not know who is the origin of the infection!

Let’s see how AUDIT4MAIL is going to help you find out in just a few clicks who received the ransomware in your company.

Go to the Helpdesk module, in the “e-mails” section. You use the search module by e-mail address, by subject, by date, depending on the information you have gathered so far on the ransomware.

Once you have identified the suspicious e-mail, you can visualize already some key information:

– Date and time the e-mail was first received in the company

– List of the people who received it internally

By right-clicking of the external e-mail address, sender of the ransomware, a menu is displayed that allows you to go further in the analysis.

Then click on “go to dashboard”

Persons Dashboard

This dashboard, filtered on the suspicious e-mail address, is going to give you many details on the activity of the ransomware within the organisation. For exemple the total number of infested internal e-mail addresses, and the list of the employees who received the ransomware in their inboxes.

The relations graph

Through the relations graph you get a visual representation of the ransomware’s activity in the company. It’s easy to share with management and the various heads of departments.

AUDIT4MAILis a messaging intelligence tool. The dedicated module for IT and administrators provides many useful information about the e-mail system.

It is a realsupport for your helpdeskwithdifferentvisualisationsof yourmessaging infrastructure.

Did you find this tutorial useful? There are many applications of AUDIT4MAIL which are still to be unveiled, please check again our website, or why don’t you subscribe to our newsletter so that you don’t lose any new article?

Our team can support you in many IT security projects. Let’s schedule a live demo and learn more about your challenges.